Page 62 - SAMENA Trends - July-August 2023
P. 62

ARTICLE  SAMENA TRENDS

        Proactively set the tone at the top     The  US’ Securities  and  Exchange  Commissions  (SEC)
        Cybersecurity is a strategic activity of any
        organization.  While  most  of  successful   recognized the impact a major cyberattack can have on a
        attacks  remain  manageable   within    business and issued very recently new rules requiring all
        organizations,  only  one  data  breach  on   publicly traded companies in the US to release details of
        sensitive/personal  information  can  ruin
        hard-earned  customers and  investors   a cyberattack within four days of determining that it has a
        trust.  The  US’ Securities  and  Exchange   material impact. By placing cybersecurity at the forefront
        Commissions   (SEC)  recognized  the
        impact a major cyberattack can have on a   of their  agenda,  leaders  (management  and boards)
        business and issued very recently new rules   demonstrate  their  commitment  to  protecting  valuable
        requiring  all  publicly  traded  companies in
        the US to release details of a cyberattack   assets, sensitive information, and customer trust.
        within four days of determining that it has
        a material impact. By placing cybersecurity   advancement, the complexity and cost of   address  software  supply  chain  related
        at  the  forefront of their  agenda, leaders   cyberattacks, the regulatory framework or   risks.
        (management  and  boards)  demonstrate   even the maturity of the organization and   •   Develop partnerships and collaboration:
        their  commitment  to protecting  valuable   industry  in  which  a  specific  it  operates.   Cyber threats,  especially  those  arising
        assets, sensitive information, and customer   However, there  are  some  basic  umbrella   from technology, transcend geographical
        trust. As pointed out in one recent Kearney   measures  that  we recommend ensuring   and  organizational  boundaries,
        article , they should adopt a  proactive   they  are  in  place  during  the  digital   necessitating  a  unified  and  cohesive
             3
        approach, ensuring  that  cybersecurity   transformation:                  approach to defense on top of individual
        strategies  align  with  the  evolving threat   •   Ensure security  is by design  and  by   approaches. Organizations  should  work
        landscape  and  organization  risk  appetite,   default:  Organizations  should ensure   with  governments  and  international
        and outcomes are regularly assessed using   security  is  by  design  during  project   entities  to  foster  collaboration  within
        right technical and operational performance   and  system  design  (e.g,  implementing   their relevant cyber ecosystem to enable
        metrics (E.g., Lost  manufacturing  hours,   DevSecOps practices)  and  by default   intelligence, best practices, and resource
        lost  engineering hours, lost  sales  hours).   in  every  configuration  to  proactively   sharing and development of standardized
        This  involves  not  only  investing  in  robust   protect  against  cyber threats.  Many   frameworks, regulations and approaches
        cybersecurity resources  and  capabilities   organizations  are  tempted  to move   to collectively address emerging threats
        (technological  and  human)  but also   fast  in  their  transformation  and  neglect   and vulnerabilities.
        commit their  personal  time  to infuse  and   cybersecurity, leaving  several  loopholes   •   Invest  in the human  factor: As
        foster a robust cybersecurity-aware culture   that  will be exploited  by hackers. While   approximately  70%  of cyber-attacks  are
        across  the  organization,  emphasizing  the   policies  and procedures  are important   caused by human errors, a cybersecurity
        shared responsibility  of all  stakeholders   to implement security by design and by   strategy  without  a  comprehensive  and
        in  safeguarding  data  and  systems.  CISOs   default,  it  is  mostly  an  organizational   innovative approach to cybersecurity
        (Chief  Information  Security  Officers)  have   mindset that need to change and evolve   education and awareness is incomplete
        an important role to play to educate, support   towards that philosophy.   and cannot yield the expected return.
        and  enable  business  executives  on  their   •   Manage  supply  chain risks:  In  recent   Consider  advanced  cybersecurity
        ability to make thoughtful and meaningful   years,  it  is  estimated  that  around 50   techniques and technologies
        cybersecurity decisions,  by  ensuring  at  a   percent  of cyberattacks  came from   After fixing the basics, organizations should
        minimum  that  assets  are  identified  and   third parties,  with  negative effects  on   move  to  a  visionary  state  and  consider
                                                                              6
                                                            5
        classified,  and  executives  are  fully  aware   customer churn     reaching  20  percent    trying different approaches that will fit the
        and informed of the associated risks.  .cybersecurity-related  disruptions  in  evolving threat landscape.
                                               the  supply  chain  have  cost  businesses   •   Adopt  zero-trust  principles:
        Fix the basics                         $1  trillion  in  the  US and  Europe  alone.   implementing  a Zero  Trust model  is
        A recent study   that Kearney conducted with   Good starting  points  to mitigate  these   essential  for  bolstering  cybersecurity
                   4
        several executives worldwide, showed that   disruptions  are  to conduct regular—  and  can  safeguard  critical  assets,  as
        approximately  50%  of organizations  had   and  comprehensive—“value-at-risk”  traditional  perimeter defense  measures
        still  a  reactive  approach to cybersecurity   assessments, design disciplined vendor   prove  insufficient  against  sophisticated
        and the basics are not met. The threshold   risk  management  capabilities  and  threats. Zero Trust operates on a "need-
        of what is considered as basics is not static   implement  software  bill  of material   to-know" basis, assuming  no implicit
        and depends on numerous factors such as   veri¬fication in order to identify software   trust  of users, devices, or applications,
        the risk appetite, the state of technological   components and dependencies and thus   even  within  the organization's  network







                                                                                                  62  JULY-AUGUST 2023
   57   58   59   60   61   62   63   64   65   66   67